General

  • Target

    Obekräftade 150523.crdownload

  • Size

    458KB

  • Sample

    241204-pf7kasvpb1

  • MD5

    6535abdad3ba947fa280b8d5f836751b

  • SHA1

    5c7d20d35bcd2049fea5c07ad4d83e4e0e2fb494

  • SHA256

    15f5346f636fa7879882f23611d46da7d7fab3e03cf75366f8721fe54804f8fd

  • SHA512

    5edc1bac7c636d2488578d97544cedd18f61124f2a732b49ffd891aeac00a19af6dc4c42e8e4c9e52f5ae0e908f059219f0ceae698d9084453335877bea132a1

  • SSDEEP

    12288:oHl1OgPc6NQpZZbzYQqKevezSE3l52fsl:oH26CpZNUvezH52w

Malware Config

Targets

    • Target

      Obekräftade 150523.crdownload

    • Size

      458KB

    • MD5

      6535abdad3ba947fa280b8d5f836751b

    • SHA1

      5c7d20d35bcd2049fea5c07ad4d83e4e0e2fb494

    • SHA256

      15f5346f636fa7879882f23611d46da7d7fab3e03cf75366f8721fe54804f8fd

    • SHA512

      5edc1bac7c636d2488578d97544cedd18f61124f2a732b49ffd891aeac00a19af6dc4c42e8e4c9e52f5ae0e908f059219f0ceae698d9084453335877bea132a1

    • SSDEEP

      12288:oHl1OgPc6NQpZZbzYQqKevezSE3l52fsl:oH26CpZNUvezH52w

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

MITRE ATT&CK Enterprise v15

Tasks